KLASIFIKASI MALICIOUS URL PADA FILE MENGGUNAKAN METODE K-NEAREST NEIGHBOR BERDASARKAN LEXICAL FEATURE EXTRACTION

MAFAZA, RIZKI VALEN and Heryanto, Ahmad (2023) KLASIFIKASI MALICIOUS URL PADA FILE MENGGUNAKAN METODE K-NEAREST NEIGHBOR BERDASARKAN LEXICAL FEATURE EXTRACTION. Undergraduate thesis, Sriwijaya University.

[thumbnail of RAMA_56201_09011281823134.pdf] Text
RAMA_56201_09011281823134.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (2MB) | Request a copy
[thumbnail of RAMA_56201_09011281823134_TURNITIN.pdf] Text
RAMA_56201_09011281823134_TURNITIN.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (9MB) | Request a copy
[thumbnail of RAMA_56201_09011281823134_0022018703_01_front_ref.pdf] Text
RAMA_56201_09011281823134_0022018703_01_front_ref.pdf - Accepted Version
Available under License Creative Commons Public Domain Dedication.

Download (703kB)
[thumbnail of RAMA_56201_09011281823134_0022018703_02.pdf] Text
RAMA_56201_09011281823134_0022018703_02.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (235kB) | Request a copy
[thumbnail of RAMA_56201_09011281823134_0022018703_03.pdf] Text
RAMA_56201_09011281823134_0022018703_03.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (820kB) | Request a copy
[thumbnail of RAMA_56201_09011281823134_0022018703_04.pdf] Text
RAMA_56201_09011281823134_0022018703_04.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (836kB) | Request a copy
[thumbnail of RAMA_56201_09011281823134_0022018703_05.pdf] Text
RAMA_56201_09011281823134_0022018703_05.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (17kB) | Request a copy
[thumbnail of RAMA_56201_09011281823134_0022018703_06_ref.pdf] Text
RAMA_56201_09011281823134_0022018703_06_ref.pdf - Bibliography
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (89kB) | Request a copy
[thumbnail of RAMA_56201_09011281823134_0022018703_07_lamp.pdf] Text
RAMA_56201_09011281823134_0022018703_07_lamp.pdf - Accepted Version
Restricted to Repository staff only
Available under License Creative Commons Public Domain Dedication.

Download (361kB) | Request a copy

Abstract

Various forms of attack models ranging from hosting, spreading malware and phishing websites, these actions can start from accessing the Uniform Resource Locator (URL) or files that contain malicious links in them. A Uniform Resource Locator (URL) is a special identifier used to find resources over the internet. Malicious URLs can be a threat using various types of attacks, usually malicious URLs are disguised so they are easy to miss. What needs to be done to differentiate between malicious URLs and normal URLs is to use feature extraction to identify various important characteristics of malicious URLs. The extraction feature used is a lexical feature which consists of 18 features. After extraction, the results of the unbalanced dataset will be resampled using oversampling with SMOTE. This research uses the k-nearest neighbor machine learning algorithm to classify the dataset. K-Nearest Neighbor is a different characteristic classification algorithm that determines the class to which unlabeled data belongs using distance to calculate the nearest neighbors. This algorithm is able to achieve high classification accuracy and provide the best results. This research obtained evaluation results with the highest accuracy value of 98.78%, precision 98.785%, recall 98.795% and f1-score 98.79%.

Item Type: Thesis (Undergraduate)
Uncontrolled Keywords: Uniform Resource Locator, Malicious URL, Lexical Features, Synthetic Minority Over-sampling Technique (SMOTE), K-Nearest Neighbor, Machine Learning
Subjects: T Technology > T Technology (General) > T1-995 Technology (General)
Divisions: 09-Faculty of Computer Science > 56201-Computer Systems (S1)
Depositing User: Rizki Valen Mafaza
Date Deposited: 31 Oct 2023 01:03
Last Modified: 31 Oct 2023 01:03
URI: http://repository.unsri.ac.id/id/eprint/130126

Actions (login required)

View Item View Item